Summer 2012:

  1. Cyber Attack Targets Gas Pipeline Companies Summary
2. Article : Hacked Utah health data guarded by weak passwordSummary
3. Low Tech Hacker Breaks Into Celebrity E-mail accountsJohn McBride
4. Iran Confirms Attack by Virus That Collects Information Andrea Milic
6. Google Chrome Tabs Let Malware Sneak Into Businesses Ryan Bingell
7. US warns users of new Citadel ransomware hit Asad Merchant
8. Cross-Browser Malware Spreading Through Facebook.Seunghyun Lee
9. Key Internet operator VeriSign hit by hackers Lana Kuzminskaya-Summary
10. Nissan Is Latest Company to Get Hacked Steve Miller
11. Senator asks for details in Thrift Savings breach Heather Anderson
13. Not Built Ford Tough Mark Buhring
14. Romney Campaign Investigates Hotmail Account HackJeri Samet
15. 6.4 Million Passwords Reportedly Stolen From LinkedIn Website Asad Merchant
16. On Password Security Alicia Hasty
17. Google: Cyberspies Have Many Eyes, and Some Are Looking at Gmail Stephanie Watkins
18. Cyber warfare Gets Political Julia Vezina (Summary)
19. Student phishing scam (BBC news) Angelina Fernandez
20. CloudFlare Security Breach Jacob Booth
21. HIPPA Privacy and Security Audit Results Alicia Hasty
22.Alleged Lulzsec member, Ryan Cleary, indicted in U.S.Tania Dunn
23.Experts warn of shortage of U.S. cyber prosTania Dunn
24. Hacked companies fight back with controversial steps Brenton Oswandel
25. Owners May Not Be Covered When Hackers Wipe Out A Business Bank Account Brenton Oswandel
26. Legislators set to Toughen Identity Theft Law (Tampa) Harmony Lazore
27. RSA Security - Advanced Persistent Threat (APT) attack Buhring, Mark
28. MTNL Website Hacked By AnonymousMelissa McCroan
29. FBI, DEA warn IPv6 could shield criminals from policeAbdeljalil Ezziouri
30. Foxconn Hit By Security BreachMelissa McCroan
31. FBI & DEA Warn That IPv6 May Be Too Damn Anonymous Kevin Gay
32. Fujitsu Cracks Next-Gen Cryptography Standard Kevin Gay
33. DCF Security BreachChristina Parnell
34. JPL Computers HackedChristina Parnell
35. Aerospace Cyber-Attack Jacob Booth
36. Malware for Macs Lucrative, Security Researchers Say Jeri Samet
37. John McBride
38. NASA Repeatedly Attacked, Jet Propulsion Lab Compromised Dale West
39. The Real Lessons Of Gawker's Security Mess Dale West
40. Hackers grab customer data, demand cash from payday lender Jonathan Young
41. Google Play Exploits Bypass Malware Checks Steven Thompson
42. 7 Lessons from MilitarySingles.com Hack Steven Thompson
43. Hackers Take Credit for Twitter Outages Tim Houmes
44. Global Payments falls on data hack update Tim Houmes
45. CFTC Data Breach Chandni Kalra
46. Google Apps Security Beat By CloudFlare Hackers Heather Anderson
47. FTC Sues Hotel Operator Wyndham Worldwide Over Data Breaches Ryne Stone
48. Cybercriminals Using 'Lego' Approach to Crime Kit Development Ryne Stone
49. Hackers targeting Indian banks with new tools Chandni Kalra
50.Sophisticated Global Fraud Operation Detailed in New Report Abdeljalil Ezziouri
51. The quest for an unhackable codeRobert Trimble
52. Pentagon Admits Major Data Breach as It Unveils Defensive Cyber-Strategy
53. Huge spike in spam delivers flood of malware to inboxes in August
54. Global financial cybercrime sting yields 24 arrests by Kenneth Loricchio
42 . Researchers use spoofing to hack into a flying drone by Stephanie Watkins
55. Following security breach, expect a lot of spamMonika Borches
56. FTC Hits Wyndham Hotels With Lawsuit Over Three Hacker Breaches In Two Years by Kenneth Loricchio
57. Security Breaches Shake Confidence in Credit-Card Safety Jenn Patterson
58. Chinese Hackers penetrate Indian Navy Jonathan Young
59. Denial-of-Service Attack Knocks Twitter Offline (Updated) Monika Borches
60. Cyber crime moves to the cloud Two hackers plead guilty to LulzSec attacks on Web sites Rebecca Curry
61. Phisher Convicted in Massive SchemeBianca Bloomfield
62. Feds Charge Hacker in POS AttacksBianca Bloomfield
63. Feds Sue Wyhdham Hotels Over Repeated Computer Hacks Harmony Lazore
64. MasterCard and Visa Investigate Data Breach Heather Anderson
65. Cybercriminals increasingly use online banking fraud automation techniquesStacy Cohn
66. Nokia Developer Database Compromised by SQL InjectionRobert Trimble
67. New OS X Tibet malware variant surfaces Victoria Barnett
68. Microsoft identifies two Zeus botnet crime ring suspectsVictoria Barnett
69. MD Anderson Cancer Center Security BreachSteve Miller
70. Anonymous Hacker Hits Arizona boarding school.Seunghyun Lee
71 Latest hacker dump looks like Comcast, AT&T data
72 eHarmony says no other info stolen following password hack
73 Japan Android Malware schemeConner
74 FBI Official says cybercriminals unsustainableConner
75.Security Breach: Lost Data Cartridges May Have Exposed Personal Records Svetlana Kuzminskaya
76. 'Printer Bomb' Malware Spread Via Compromised .htaccess Files, Says SymantecMonika Negron
77. 2-Year Sting Nets FBI Dozens of Suspected Cybercrooks Brice Husselbaugh
78. Malware Goes MobileJulia Vezina (Summary 2)
79. RSA Encryption 'Crack' Rattles Infosec Industry Brice Husselbaugh
80. Researchers Link Sykipot Trojan to Spear-Phishing Attacks Monika Negron
81.Olympic experts sure they can repel cyber threatHong Wang
82.Virus could black out nearly 250,000 PCsHong Wang
83. Security breach found at BCIT campus health clinic Arielle Benson
84. NasDaq Servers CompromisedArielle Benson 2
85. Boxer SMS Trojan poses as Firefox for Android Stacey Samball
86. LinkedIn breach puts site's reputation on the lineStacey Samball
87.Iranian Hackers Suspected in Recent Security BreachHolly Nichols
88.Hackers strike again, hit Nvidia's developer zoneHong Wang

Fall 2011
  1. AICPA Top Technology Initiatives
  2. Safari on Mac OS X vulnerable to Man-in-the-Middle attacks And a Fix for IOS5
  3. New cyber war guidelines & US //Matrix//-style Cyberwar firing range moves forward
  4. HBGary Federal hacked and exposed by Anonymous
  5. Google Maps Listings Marred By False Information
  6. Hackers break SSL And a Fix for IOS5
  7. Lion Security Flaw
  8. On the Internet, Nobody Knows You’re a Robot
  9. The Worm that could bring down the Internet (NPR's Fresh Air, 09/27/2011)
  10. Man-in-the-Middle Standing between you and your cash (RSA, 10//5/2011)
  11. U.S. Drone Virus Attack (10/13/2011)
  12. New Malicious Program by Creators of Stuxnet
  13. How to secure your email with OS X and iOS5 (ars technica, 10/18/2011)
  14. The Nitro Attacks: Stealing Secrets from the Chemical Industry
  15. Duqu Worm Targets Microsoft Word
  16. Charlie Miller Article
  17. Millions of printers open to devastating hack attack, researchers say
  18. Commercial Spookware - this is really scary stuff. (The [[#|Register]], 12/01/2011)

Spring 2012
  1. In Planning Digital Defenses, the Biggest Obstacle Is Human Ingenuity(NY Times, 12/05/2011)
  2. CyberSecurity Insurance (NY Times, Bits Blog, 12/23/2011)
  3. Hackers Breach Website of Stratfor Global Security (NY Times, 12/26/2011)
  4. AntiSec Hits Private Intel Firm (Stratfor) (Wired, 12/26/2011)
  5. 2012 IT Security Predictions
  6. Duqu, son of Stuxnet? (SC Magazine, 01/13/2012)
  7. Hackers disrupt Israel's stock exchange (MSNBC, 1/16/2012)
  8. Zappos says hackers may have accessed info on 24 million customers (MSNBC, 1/16/2012)
  9. KoobFace Hacking Group (NY Times, 01/17/2012)
  10. Olympic security dossier left on London train (info security.com 1/19/2012)
  11. Anonymous hackers at it again(MSNBC, 1/19/2012)
  12. Anonymous Just Deleted CBS.com and Took Down Universal (Gizmodo.com 1/22/12)
  13. Boardroom Videoconferencing Vulnerabilities (NY Times, 1/23/2012)
  14. Cyber-Crime in 2012 (ITP.net, 1/20/2012)
  15. http://www.examiner.com/anonymous-in-national/ufc-s-dana-white-suffers-knock-out-after-challenging-anonymous (examiner.com 1/26/12)
  16. http://www.youtube.com/watch?v=15IRZdEUO20&feature=player_embedded#! (youtube ufc hack 1/26/12)
  17. The first computer password? (Ars Technica, 1/27/12)
  18. http://thesocietypages.org/cyborgology/2012/02/01/there-is-no-cyberspace/ (The Society Pages, 2/1/12)
  19. http://www.sec.gov/Archives/edgar/data/1014473/000119312511285850/d219781d10q.htm
  20. EU coming Security Strategy (InfoSecurity, 2/7/12)
  21. Android App Malware Botnets (oh my!), InfoSecurity, 2/9/12)
  22. Ex-IRS Employee Sentenced for Identity Theft(Accounting Today, 2/10/12)
  23. Developers say Apple needs to overhaul iOS user information security (Ars Technica, 2/15/12)
  24. Anonymous targets Canadian MP and his Internet Protection Bill.
  25. NIST establishes National Cybersecurity Center of Excellence (Press Release, 2/21/12)
  26. Safari Trackers (Mostly technical stuff here, 2/17/12)
  27. Anatomy of an Anonymous attack (Imperva, 2/12)
  28. http://money.cnn.com/2012/02/28/technology/rsa_cybersecurity_attacks/index.htm
  29. The Future of Quantum Computing (ZMEScience 2/28/12)
  30. ISS command and control codes lost(NPR, 3/1/2012)
  31. Anonymous hackers tricked into installing Malware
  32. Lulzsec alleged Leader pleads guilty (and takes others with him?) (NPR, 3/6/12)



  33. This is not really "security in the news" but is an article from 1972 that I found interesting.
  34. Anonymous members speak out at surreal SXSW panel(CNN Tech, 3/15/12)
  35. AICPA 2012 Top 10
  36. http://www.sys-con.com/node/2227418 "Bit9 to Exhibit Advanced Threat Protection Platform at 2012 DoDIIS Conference in Denver," focus on intellectual property
http://www.bit9.com/
37. http://online.wsj.com/article/SB10001424052702304177104577307773326180032.html?KEYWORDS=fbi+hack "US Outgunned in Hacker War"
(Wall Street Journal, 3/28/2012)
38. Warned of an Attack on the Internet, and Getting Ready(NY Times, 3/31/12)
39. Exploit released for hijacking critical infrastructure (Wired, 4/5/12)
40. Ai Weiwei, Chinese government friction intensifies over webcams(LA Times Blogs, 4/5/12)
41. Check your Mac for the Flashback Trojan(github.com)